Incident Management and Response
This page includes references to a few sources on crisis management and response practices and related expertise. These might help in assessing one's options for establishing a CERT, CSIRT, or replicating and implementing practical advice in the process of doing that.
Organization | Title | Year ↓ | Type | Description |
Global Forum on Cyber Expertise (GFCE)
|
Introduction to Tabletop Exercises (TTX) | 2023 | Guide |
Cyber Incident Management and Critical Information Infrastructure Protection by GFCE
A tabletop exercise is a simulation where personnel with roles and responsibilities in a particular Information Technology (IT) & Operational Technology (OT) plan and meet in various settings (e.g. breakout groups, virtually, etc).
Key benefits of conducting TTXs:
This first deliverable provides an introduction to what, who, how, and why TTXs are essential for improving cyber resilience as well as providing an array of scenarios. The following two deliverables that form the rest of the package provide more operational information on how to organize and execute a TTX so that organizations can benefit from TTXs effectively.
|
2023 |
Guide |
One of the best practices for establishing a national computer security incident response team (CSIRT) was developed by the Organization of American States |
||
Foreign & Commonwealth Office and by Foreign Commonwealth and Development Office |
2021 | Guide |
The guide documents sharing cybercrime, cybersecurity, and cyber threat intelligence information in the financial sector by providing an overview of core principles, objectives, benefits, and best practices.
The intended audience includes relevant leaders and practitioners in financial institutions, banking associations, national computer emergency response teams, government agencies, law enforcement, regulators, and other relevant private and public-sector organizations. This document especially is addressed to:
|
|
Geneva Centre for Security Sector Governance by Milan Sekuloski |
DCAF’s CSIRT Capacity Building Methodology: Lessons Learned from the Western Balkans | 2021 | Methodology | This report aims to support the international efforts for effective CSIRT capacity-building. This paper and proposed methodology aim at supplementing the existing approaches and methodologies, and by presenting some of the cases it draws from, offers additional material to the international body of knowledge in cybersecurity capacity building. |
by Melissa Hathaway and Francesca Spidalieri |
Integrating Cyber Capacity to the Digital Development Agenda | 2021 | Study | Promoting digital transformation has become a priority for sustainable development and why organizations like the United Nations, large donor organizations, and countries involved in development assistance are prioritizing digitization as one of the key enablers of inclusive and sustainable economic growth and development. Yet, rapid digital transformation – underpinned by affordable communications and cheap devices – has introduced new risks and vulnerabilities that cannot be ignored. Organizations and countries alike are becoming increasingly concerned about the misuse of digital technologies that might lead to critical infrastructure failures, financial destabilization, increased surveillance, human rights abuses, disinformation, data exploitation, and other negative impacts on public health and safety. |
The French National Cybersecurity Agency (ANSSI) | 2021 | Guide |
The purpose of this guide is to provide step-by-step support to organizations in setting up a cyber crisis management exercise that is credible and will serve as training, for both players and organizers. The organization of cyber crisis management exercises is fundamental. Carried out in partnership with the Club de la Continuité d’Activité (Business Continuity Club, CCA) and with the contribution of ENISA, this guide is the result of expertise developed at ANSSI over the years; and the combination of experience in cyber security and crisis management.
The purpose of this guide is to provide step-by-step support to organizations in setting up a cyber crisis management exercise that is credible and will serve as training, for both players and organizers. It offers a methodology based on the recognized standard of the guidelines for exercises (ISO 22398:2013).
More specifically, this guide is for anyone who wishes to organize exercises at the decision-making level to train their organization’s crisis unit: the risk managers, those responsible for business continuity, exercises, or crisis management, those responsible for the security of information systems (SIS) or equivalent, etc. This guide is not intended to construct exercises that are purely technical, for instance, by providing a complete simulation of an information system (IS) using virtual machines (“cyber range”). |
|
European Union Institute for Security Studies | INTERNATIONAL CYBER CAPACITY BUILDING: GLOBAL TRENDS AND SCENARIOS | 2021 | Report |
International cyber capacity building (CCB) projects involve countries, companies, and organizations helping each other across borders to develop functioning and accountable institutions that respond effectively to cybercrime and to strengthen a country’s cyber resilience. These projects take many forms, such as advising government teams that respond to national cybersecurity incidents, helping countries design and run public awareness campaigns about staying safe online, and training police to investigate cybercrime. This report identifies four trends in cyber capacity building and extrapolates their development to explore four potential scenarios that can inform capacity builders’ strategic decision-making.
|
European Union Agency for Cybersecurity (ENISA) | Guide on How to Set up CSIRT and SOC | 2020 | Good Practice |
This is result-driven guidance on establishing a computer security incident response team (CSIRT) or security operations center (SOC) and guidance on improvements for different types of CSIRTs and SOCs. This tool was developed as part of a project directed by the European Union Agency for Cybersecurity (ENISA) |
2019 | Guidance |
As security measures evolve, so do the capabilities of the culprits. As a result, no security can ever be perfect. Incidents can and will happen, so it's important to be prepared for them. The guidance by NCSC helps in planning, building, developing, and maintaining an effective cyber incident response capability. |
||
Geneva Centre for Security Sector Governance Cybersecurity | Cybersecurity – DCAF’s Work on CERT Development | 2019 | Discussion | Discussions about CERT development usually center on technical needs, such as hardware and software, or costly staff training. It is impossible to identify the most appropriate tools, however, without developing the strengths of the team to help it to better absorb new knowledge and adapt equipment to its needs. |
Thai Computer Emergency Response Team
Electronic Transactions Development Agency (ETDA) by Martijn van der Heide |
Establishing a CSIRT | 2017 | Handbook |
With the ever-expanding Internet and the fact that more and more critical organizations require Internet access these days, stability and availability become ever more important. Critical Infrastructure (e.g., Financial Sector, Energy, Transport, or Government) rely more and more on the possibilities of citizens to access their services through the Internet. At the same time, they use the Internet more and more to provide services to each other. Primary processes of many organizations have become reliant on the availability of the Internet, too.
The handbook is designed for organizations who wish to learn more about CSIRT teams and start one themselves. It describes both the process to establish a team and the various requirements. Examples are given where possible, to show how each step can be completed. The intended audience is management level, but the handbook can also directly be used by operational staff, as a reference guide. |
|
On Computer Security Incident Response Teams |
2014 | Article | CSIRTs have evolved from loosely organized groups of system administrators to highly trained organizations with diverse capabilities, relying on complex technology to track, analyze, manage, and remediate security incidents. For many organizations, the CSIRT is the front line of security defenses—where they determine if they’re being attacked and how to respond. CSIRTs are highly labor-intensive; it’s not unusual for the CSIRT of a large organization to consist of more than 50 people. Labor is the most expensive component, generally far exceeding the costs of the technology components. As a result, organizations are under tremendous pressure to optimize this precious resource. |